Decision and Game Theory for Security

Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings

  • Jens Grossklags
  • Jean Walrand
Conference proceedings GameSec 2012

DOI: 10.1007/978-3-642-34266-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7638)

Table of contents (18 papers)

  1. Front Matter
  2. Secret Communications

    1. Where to Hide the Bits ?
      Benjamin Johnson, Pascal Schöttle, Rainer Böhme
      Pages 1-17
    2. Socio-Rational Secret Sharing as a New Direction in Rational Cryptography
      Mehrdad Nojoumian, Douglas R. Stinson
      Pages 18-37
  3. Identification of Attackers

    1. Audit Mechanisms for Provable Risk Management and Accountable Data Governance
      Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha
      Pages 38-59
    2. A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets
      SingRu (Celine) Hoe, Murat Kantarcioglu, Alain Bensoussan
      Pages 60-77
    3. Computing the Nash Equilibria of Intruder Classification Games
      Lemonia Dritsoula, Patrick Loiseau, John Musacchio
      Pages 78-97
  4. Multi-step Attacks

    1. Upper Bounds for Adversaries’ Utility in Attack Trees
      Ahto Buldas, Roman Stepanenko
      Pages 98-117
    2. Simulation and Game-Theoretic Analysis of an Attacker-Defender Game
      Alan Nochenson, C. F. Larry Heimann
      Pages 138-151
  5. Network Security

    1. Deceptive Routing in Relay Networks
      Andrew Clark, Quanyan Zhu, Radha Poovendran, Tamer Başar
      Pages 171-185
  6. System Defense

    1. Game Theoretic Model of Strategic Honeypot Selection in Computer Networks
      Radek Píbil, Viliam Lisý, Christopher Kiekintveld, Branislav Bošanský, Michal Pěchouček
      Pages 201-220
    2. Are We Compromised? Modelling Security Assessment Games
      Viet Pham, Carlos Cid
      Pages 234-247
    3. Defending against the Unknown Enemy: Applying FlipIt to System Security
      Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest et al.
      Pages 248-263
  7. Applications Security

    1. Incentives and Security in Electricity Distribution Networks
      Saurabh Amin, Galina A. Schwartz, Hamidou Tembine
      Pages 264-280
    2. Security Games and Risk Minimization for Automatic Generation Control in Smart Grid
      Yee Wei Law, Tansu Alpcan, Marimuthu Palaniswami, Subhrakanti Dey
      Pages 281-295
  8. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012.
The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.

Keywords

agent-based modeling computational complexity information hiding routing algorithms steganography

Editors and affiliations

  • Jens Grossklags
    • 1
  • Jean Walrand
    • 2
  1. 1.College of Information Sciences and TechnologyThe Pennsylvania State UniversityUniversity Park,USA
  2. 2.Department of Electrical Engineering and Computer SciencesUniversity of CaliforniaBerkeleyUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34265-3
  • Online ISBN 978-3-642-34266-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349